Heap-based buffer overflow in the SPDY implementation in nginx 1.3.15 before 1.4.7 and 1.5.x before 1.5.12 allows remote attackers to execute arbitrary code via a crafted request.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-updates/2014-03/msg00095.html | Mailing List Third Party Advisory |
http://mailman.nginx.org/pipermail/nginx-announce/2014/000135.html | Vendor Advisory |
http://www.securityfocus.com/bid/66537 | Third Party Advisory VDB Entry |
http://lists.opensuse.org/opensuse-updates/2014-03/msg00095.html | Mailing List Third Party Advisory |
http://mailman.nginx.org/pipermail/nginx-announce/2014/000135.html | Vendor Advisory |
http://www.securityfocus.com/bid/66537 | Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 02:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-updates/2014-03/msg00095.html - Mailing List, Third Party Advisory | |
References | () http://mailman.nginx.org/pipermail/nginx-announce/2014/000135.html - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/66537 - Third Party Advisory, VDB Entry |
Information
Published : 2014-03-28 15:55
Updated : 2024-11-21 02:01
NVD link : CVE-2014-0133
Mitre link : CVE-2014-0133
CVE.ORG link : CVE-2014-0133
JSON object : View
Products Affected
opensuse
- opensuse
f5
- nginx
CWE
CWE-787
Out-of-bounds Write